Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2013-04

AUTHORS

Chu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang

ABSTRACT

Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services. More... »

PAGES

275-282

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x

DOI

http://dx.doi.org/10.1007/s12652-011-0091-x

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1021122170


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Department of Computer Science, Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lin", 
        "givenName": "Chu-Hsing", 
        "id": "sg:person.010744504041.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010744504041.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lin", 
        "givenName": "Hung-Yan", 
        "id": "sg:person.010365243171.81", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010365243171.81"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wu", 
        "givenName": "Tang-Wei", 
        "id": "sg:person.015513407223.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015513407223.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chen", 
        "givenName": "Ying-Hsuan", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunghai University", 
          "id": "https://www.grid.ac/institutes/grid.265231.1", 
          "name": [
            "Tunghai University, 407, Taichung, Taiwan, ROC"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Huang", 
        "givenName": "Chien-Hua", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/s1007-0214(09)70097-5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017203557"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/997150.997156", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020238858"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.cose.2009.12.011", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029536700"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.comnet.2010.05.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029599983"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.camwa.2009.12.035", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047847291"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2002.1039856", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393445"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2003.1215651", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393605"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2005.1453433", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061394080"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mic.2006.5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061403645"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/seccomw.2006.359548", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094544788"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdcsw.2005.84", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095118694"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdcsw.2005.84", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095118694"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/pccc.2003.1203698", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095470118"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013-04", 
    "datePublishedReg": "2013-04-01", 
    "description": "Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s12652-011-0091-x", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1043999", 
        "issn": [
          "1868-5137", 
          "1868-5145"
        ], 
        "name": "Journal of Ambient Intelligence and Humanized Computing", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "2", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "4"
      }
    ], 
    "name": "Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues", 
    "pagination": "275-282", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "64a30594989252016c6bb5344619b0bed4c67e90d6a915294872518700acf5f1"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s12652-011-0091-x"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1021122170"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s12652-011-0091-x", 
      "https://app.dimensions.ai/details/publication/pub.1021122170"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T01:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000521.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007%2Fs12652-011-0091-x"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12652-011-0091-x'


 

This table displays all metadata directly associated to this object as RDF triples.

124 TRIPLES      21 PREDICATES      39 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s12652-011-0091-x schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author Nae8a2863c41749bca2cc5b7e71e853a4
4 schema:citation https://doi.org/10.1016/j.camwa.2009.12.035
5 https://doi.org/10.1016/j.comnet.2010.05.002
6 https://doi.org/10.1016/j.cose.2009.12.011
7 https://doi.org/10.1016/s1007-0214(09)70097-5
8 https://doi.org/10.1109/icdcsw.2005.84
9 https://doi.org/10.1109/mcom.2002.1039856
10 https://doi.org/10.1109/mcom.2003.1215651
11 https://doi.org/10.1109/mcom.2005.1453433
12 https://doi.org/10.1109/mic.2006.5
13 https://doi.org/10.1109/pccc.2003.1203698
14 https://doi.org/10.1109/seccomw.2006.359548
15 https://doi.org/10.1145/997150.997156
16 schema:datePublished 2013-04
17 schema:datePublishedReg 2013-04-01
18 schema:description Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.
19 schema:genre research_article
20 schema:inLanguage en
21 schema:isAccessibleForFree false
22 schema:isPartOf N7ea186339a1f47bb9ab6cecbbc82e45b
23 Nacebf8255c8340e3af908738fb4206ca
24 sg:journal.1043999
25 schema:name Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues
26 schema:pagination 275-282
27 schema:productId N02eecc20adfb4bfdbe5e5afaa5756d32
28 N8ec7b56c804b47e594d59f2e349b0a48
29 N94739304246e4f59ba6a549051907707
30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021122170
31 https://doi.org/10.1007/s12652-011-0091-x
32 schema:sdDatePublished 2019-04-11T01:09
33 schema:sdLicense https://scigraph.springernature.com/explorer/license/
34 schema:sdPublisher N76adce0ed7c14e18893b800ed3f3fac7
35 schema:url http://link.springer.com/10.1007%2Fs12652-011-0091-x
36 sgo:license sg:explorer/license/
37 sgo:sdDataset articles
38 rdf:type schema:ScholarlyArticle
39 N02eecc20adfb4bfdbe5e5afaa5756d32 schema:name doi
40 schema:value 10.1007/s12652-011-0091-x
41 rdf:type schema:PropertyValue
42 N2c41ffe3fa0943b98027d1aeee6d0db2 rdf:first N2d1aa3dcfe9645bd96d4a8dcc48fabd9
43 rdf:rest Nd963a810c834460daf59053e72e8b801
44 N2d1aa3dcfe9645bd96d4a8dcc48fabd9 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
45 schema:familyName Chen
46 schema:givenName Ying-Hsuan
47 rdf:type schema:Person
48 N76adce0ed7c14e18893b800ed3f3fac7 schema:name Springer Nature - SN SciGraph project
49 rdf:type schema:Organization
50 N7ea186339a1f47bb9ab6cecbbc82e45b schema:issueNumber 2
51 rdf:type schema:PublicationIssue
52 N8ec7b56c804b47e594d59f2e349b0a48 schema:name dimensions_id
53 schema:value pub.1021122170
54 rdf:type schema:PropertyValue
55 N90bfe5d6d2d8498b938488db292dc312 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
56 schema:familyName Huang
57 schema:givenName Chien-Hua
58 rdf:type schema:Person
59 N94739304246e4f59ba6a549051907707 schema:name readcube_id
60 schema:value 64a30594989252016c6bb5344619b0bed4c67e90d6a915294872518700acf5f1
61 rdf:type schema:PropertyValue
62 N9ee6072277fb443c89b7de6882d40442 rdf:first sg:person.015513407223.53
63 rdf:rest N2c41ffe3fa0943b98027d1aeee6d0db2
64 Nacebf8255c8340e3af908738fb4206ca schema:volumeNumber 4
65 rdf:type schema:PublicationVolume
66 Nae8a2863c41749bca2cc5b7e71e853a4 rdf:first sg:person.010744504041.35
67 rdf:rest Ndcd028fb50f7469da510be77cda6840c
68 Nd963a810c834460daf59053e72e8b801 rdf:first N90bfe5d6d2d8498b938488db292dc312
69 rdf:rest rdf:nil
70 Ndcd028fb50f7469da510be77cda6840c rdf:first sg:person.010365243171.81
71 rdf:rest N9ee6072277fb443c89b7de6882d40442
72 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
73 schema:name Technology
74 rdf:type schema:DefinedTerm
75 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
76 schema:name Communications Technologies
77 rdf:type schema:DefinedTerm
78 sg:journal.1043999 schema:issn 1868-5137
79 1868-5145
80 schema:name Journal of Ambient Intelligence and Humanized Computing
81 rdf:type schema:Periodical
82 sg:person.010365243171.81 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
83 schema:familyName Lin
84 schema:givenName Hung-Yan
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010365243171.81
86 rdf:type schema:Person
87 sg:person.010744504041.35 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
88 schema:familyName Lin
89 schema:givenName Chu-Hsing
90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010744504041.35
91 rdf:type schema:Person
92 sg:person.015513407223.53 schema:affiliation https://www.grid.ac/institutes/grid.265231.1
93 schema:familyName Wu
94 schema:givenName Tang-Wei
95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015513407223.53
96 rdf:type schema:Person
97 https://doi.org/10.1016/j.camwa.2009.12.035 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047847291
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1016/j.comnet.2010.05.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029599983
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1016/j.cose.2009.12.011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029536700
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1016/s1007-0214(09)70097-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017203557
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/icdcsw.2005.84 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095118694
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1109/mcom.2002.1039856 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393445
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/mcom.2003.1215651 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393605
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/mcom.2005.1453433 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061394080
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/mic.2006.5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061403645
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/pccc.2003.1203698 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095470118
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/seccomw.2006.359548 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094544788
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
120 rdf:type schema:CreativeWork
121 https://www.grid.ac/institutes/grid.265231.1 schema:alternateName Tunghai University
122 schema:name Department of Computer Science, Tunghai University, 407, Taichung, Taiwan, ROC
123 Tunghai University, 407, Taichung, Taiwan, ROC
124 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...